{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:02:03Z","timestamp":1755838923983,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,2,26]],"date-time":"2020-02-26T00:00:00Z","timestamp":1582675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1723714","1723717","1516100"],"award-info":[{"award-number":["1723714","1723717","1516100"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,2,26]]},"DOI":"10.1145\/3328778.3366935","type":"proceedings-article","created":{"date-parts":[[2020,2,25]],"date-time":"2020-02-25T09:02:03Z","timestamp":1582621323000},"page":"866-872","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Using Terminal Histories to Monitor Student Progress on Hands-on Exercises"],"prefix":"10.1145","author":[{"given":"Jelena","family":"Mirkovic","sequence":"first","affiliation":[{"name":"University of Southern California, Information Sciences Institute, Marina del Rey, CA, USA"}]},{"given":"Aashray","family":"Aggarwal","sequence":"additional","affiliation":[{"name":"University of Southern California, Los Angeles, CA, USA"}]},{"given":"David","family":"Weinman","sequence":"additional","affiliation":[{"name":"Evergreen State College, Olympia, WA, USA"}]},{"given":"Paul","family":"Lepe","sequence":"additional","affiliation":[{"name":"University of Southern California, Los Angeles, CA, USA"}]},{"given":"Jens","family":"Mache","sequence":"additional","affiliation":[{"name":"Lewis &amp; Clark College, Portland, OR, USA"}]},{"given":"Richard","family":"Weiss","sequence":"additional","affiliation":[{"name":"Evergreen State College, Olympia, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,2,26]]},"reference":[{"unstructured":"GENI Exploring Networks of the Future. https:\/\/www.geni.net\/.  GENI Exploring Networks of the Future. https:\/\/www.geni.net\/.","key":"e_1_3_2_1_1_1"},{"unstructured":"Man page for history command. http:\/\/man7.org\/linux\/man-pages\/man3\/history.3.html.  Man page for history command. http:\/\/man7.org\/linux\/man-pages\/man3\/history.3.html.","key":"e_1_3_2_1_2_1"},{"unstructured":"Man page for script command. http:\/\/man7.org\/linux\/man-pages\/man1\/script.1.html.  Man page for script command. http:\/\/man7.org\/linux\/man-pages\/man1\/script.1.html.","key":"e_1_3_2_1_3_1"},{"unstructured":"Man page for ttylog. http:\/\/manpages.ubuntu.com\/manpages\/xenial\/man8\/ttylog.8.html.  Man page for ttylog. http:\/\/manpages.ubuntu.com\/manpages\/xenial\/man8\/ttylog.8.html.","key":"e_1_3_2_1_4_1"},{"unstructured":"Tennesee Tech University Security Knitting Kit. http:\/\/blogs.cae.tntech.edu\/secknitkit\/.  Tennesee Tech University Security Knitting Kit. http:\/\/blogs.cae.tntech.edu\/secknitkit\/.","key":"e_1_3_2_1_5_1"},{"volume-title":"http:\/\/edurange.org, (accessed","year":"2019","author":"Testbed Range","key":"e_1_3_2_1_6_1"},{"volume-title":"https:\/\/seattle.poly.edu\/html\/, (accessed","year":"2019","author":"Testbed Seattle","key":"e_1_3_2_1_7_1"},{"volume-title":"Understanding Network Hacks: Attack and Defense with Python","year":"2016","author":"Ballmann B.","key":"e_1_3_2_1_8_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1109\/WCCIT.2013.6618731"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/2076732.2076752"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/2787622.2787710"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/3120259"},{"unstructured":"Cyber4All. Cybersecurity Modules: Security Injections. http:\/\/cis1.towson.edu\/ cssecinj\/.  Cyber4All. Cybersecurity Modules: Security Injections. http:\/\/cis1.towson.edu\/ cssecinj\/.","key":"e_1_3_2_1_13_1"},{"volume-title":"SEED: A suite of instructional laboratories for computer security education. Journal on Educational Resources in Computing (JERIC), 8(1):3","year":"2008","author":"Du W.","key":"e_1_3_2_1_14_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/2556325.2567864"},{"unstructured":"M. A. Eriksen and M. Baker. Snoopy Logger. https:\/\/github.com\/a2o\/snoopy.  M. A. Eriksen and M. Baker. Snoopy Logger. https:\/\/github.com\/a2o\/snoopy.","key":"e_1_3_2_1_16_1"},{"unstructured":"ICANN.org. DNSSEC ---- What Is It and Why Is It Important? https:\/\/www.icann.org\/resources\/pages\/dnssec-what-is-it-why-important-2019-03-05-en.  ICANN.org. DNSSEC ---- What Is It and Why Is It Important? https:\/\/www.icann.org\/resources\/pages\/dnssec-what-is-it-why-important-2019-03-05-en.","key":"e_1_3_2_1_17_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/1151588.1151600"},{"volume-title":"Measuring Student Learning On Network Testbeds. In Midscale Education and Research Infrastructure and Tools Workshop","year":"2019","author":"Lepe P.","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","volume-title":"Applied Network Security","author":"McLafferty M.","year":"2017","edition":"1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1080\/15391523.2009.10782534"},{"unstructured":"J. Mirkovic. TCP SYN Flood. https:\/\/www.isi.deterlab.net\/file.php?file=\/share\/shared\/TCPSYNFloodexercise.  J. Mirkovic. TCP SYN Flood. https:\/\/www.isi.deterlab.net\/file.php?file=\/share\/shared\/TCPSYNFloodexercise.","key":"e_1_3_2_1_22_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1109\/MSP.2012.23"},{"volume-title":"Internet Denial of Service: Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security)","year":"2004","author":"Mirkovic J.","key":"e_1_3_2_1_24_1"},{"volume-title":"https:\/\/www.nice-challenge.com\/","year":"2019","author":"Nestler V.","key":"e_1_3_2_1_25_1"},{"unstructured":"A. One. Smashing the Stack for Fun and Profit. http:\/\/www-inst.eecs.berkeley.edu\/ cs161\/fa08\/papers\/stack_smashing.pdf.  A. One. Smashing the Stack for Fun and Profit. http:\/\/www-inst.eecs.berkeley.edu\/ cs161\/fa08\/papers\/stack_smashing.pdf.","key":"e_1_3_2_1_26_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1145\/2016911.2016937"},{"unstructured":"P. A. H. Peterson. Linux and DeterLab Intro. https:\/\/www.isi.deterlab.net\/file.php?file=\/share\/shared\/LinuxandDeterLabintro\/.  P. A. H. Peterson. Linux and DeterLab Intro. https:\/\/www.isi.deterlab.net\/file.php?file=\/share\/shared\/LinuxandDeterLabintro\/.","key":"e_1_3_2_1_28_1"},{"unstructured":"P. A. H. Peterson and P. Reiher. Buffer Overflows. https:\/\/www.isi.deterlab.net\/file.php?file=\/share\/shared\/BufferOverflows-UCLA.  P. A. H. Peterson and P. Reiher. Buffer Overflows. https:\/\/www.isi.deterlab.net\/file.php?file=\/share\/shared\/BufferOverflows-UCLA.","key":"e_1_3_2_1_29_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1145\/2157136.2157182"},{"unstructured":"SeattleTestbed. Seattle in the Classroom. https:\/\/seattle.cs.washington.edu\/html\/education.html.  SeattleTestbed. Seattle in the Classroom. https:\/\/seattle.cs.washington.edu\/html\/education.html.","key":"e_1_3_2_1_31_1"},{"unstructured":"B. Sheridan and D. Massey. DNS and Man-in-the-Middle Attacks. https:\/\/www.isi.deterlab.net\/file.php?file=\/share\/shared\/DNSmaninthemiddleattack.  B. Sheridan and D. Massey. DNS and Man-in-the-Middle Attacks. https:\/\/www.isi.deterlab.net\/file.php?file=\/share\/shared\/DNSmaninthemiddleattack.","key":"e_1_3_2_1_32_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1109\/BSC.2008.4563248"},{"unstructured":"USC\/ISI and U. Berkeley. DeterLab testbed. http:\/\/isi.deterlab.net.  USC\/ISI and U. Berkeley. DeterLab testbed. http:\/\/isi.deterlab.net.","key":"e_1_3_2_1_34_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1109\/ICALT.2013.99"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1145\/2839509.2844646"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.1145\/2676723.2677290"}],"event":{"sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"],"acronym":"SIGCSE '20","name":"SIGCSE '20: The 51st ACM Technical Symposium on Computer Science Education","location":"Portland OR USA"},"container-title":["Proceedings of the 51st ACM Technical Symposium on Computer Science Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3328778.3366935","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3328778.3366935","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3328778.3366935","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:31Z","timestamp":1750199911000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3328778.3366935"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,26]]},"references-count":37,"alternative-id":["10.1145\/3328778.3366935","10.1145\/3328778"],"URL":"https:\/\/doi.org\/10.1145\/3328778.3366935","relation":{},"subject":[],"published":{"date-parts":[[2020,2,26]]},"assertion":[{"value":"2020-02-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}